Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
f61e2660620a59ef8f8ede77812deb7a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61e2660620a59ef8f8ede77812deb7a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f61e2660620a59ef8f8ede77812deb7a_JaffaCakes118.html
-
Size
14KB
-
MD5
f61e2660620a59ef8f8ede77812deb7a
-
SHA1
033eedc00f17bb33ec339874fd3aa21cd0b62a8e
-
SHA256
d0515cf68355ea448b8beba5eff8bcc9b281c49773c65040fb955361ef7808a6
-
SHA512
86b5bcb850543d455c099f98ced06e293eb98f5d0b3cd9b15c6029a7a5f7bdd0eed24f0c2c801e638b05ae842f8f8d7e18185423910844c623abe69da7f33189
-
SSDEEP
384:DxsR7kGylkMr96R6PyGzNQ1nhNTtdll/kf:G7kGaNG66GaVrqf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000004f5f38264d8a8d30d997e8c1d33f159c8f60594e7ef3a80e01e01d9ac734029000000000e80000000020000200000009c8dcf3f510c292591b18124bb6ee69dcff02f96c123032daa400ed37b1a9f3b200000006df695a6a493cf949581d6a7f81b8dd837031c38f8ed12e40244f0fddbd0f334400000003efc9a03bec3fa12fc97da2e2cd219fd2d2c8f14be0b28ec2aad93bf9583e285c9996cde8593f5971b8a957260ac5aafecb0939248f1192f2cc828569a156027 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E6190E1-7B42-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433432968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b005b8834f0fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1044 2220 iexplore.exe 30 PID 2220 wrote to memory of 1044 2220 iexplore.exe 30 PID 2220 wrote to memory of 1044 2220 iexplore.exe 30 PID 2220 wrote to memory of 1044 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f61e2660620a59ef8f8ede77812deb7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d301e9d99f6f2e954369596e641daad
SHA19b2b7dcaf8a9987950095a7a7d315f2103f11406
SHA256ba7ca319ef0cabfcbc64b22e83e91b8b29509bf2df8f6f1ccd2e0dcf19459eb9
SHA512dcab0773d5f472505bdf59e2921002743f916edaee1a44c6fb0ce90a00e3df894b7b391e6f0a1782912cf47f08b8ab1c0d5a64ff668d5b515836ea4c5add9817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21f8be45b70a10c9e6dc8833bfdfc8c
SHA17511b12ec3563238c9ca9c0f48fa9e3f13102475
SHA2561d9660cc60ba00ec40b71b17653a6d4eb1315573a9584ce686007ae40efee442
SHA512ca465ece290e6c6a863b7d07481d54082738e4695e08f57a2defa2bbf34e7f815ca8ce03ed5ab54cf263a156e574a9e1b2f27e3973b93bd3b883dbbd320dc90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd75b5c6c3e8971e21aba1f8177b6bae
SHA1e32b4323e9cd19fe4d15c432b270349f4bb56b77
SHA25645b096ba226c5cbfec81484c9c78e0109f22903e97f5cf5b1733d367ff89377e
SHA512ea93edb38f2ebd76fa66a6309e880b737e35630913d99704e038a1813e633664429ef5311eb96f8d87070518aa17ca545fad966339b938641f22d0e845766a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d40b7ce3fe40c654783cde1585fb954
SHA17f357c2e7a7d622db09c9493c67b228b1122dd90
SHA256d883924d97ddb4fb2f800ad3396080e96a4d8dadae9f806d63a5067ef0bad3e1
SHA51245bb08203609b407393040bd26049874be40643d747afceee86f97a5e8cb23e6f5782ec6a1b9822ef183c22e896bc65cad8aeb90c88253f902e6642c5a39a2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fdb7a8ee70ce11fa08faf00e23d3661
SHA1f4dc6f734697df2ff7c666633ccf24f819deecd1
SHA256fe8571240e144363f21ab8ccb3f8eb2097ba4aba1a3525573e30f3b3b8e36529
SHA5123130481e222cd9ce36ac4d058e12b7f4d3039458d7e399374035caed96f583fef34b33bf6158ea2d07ea57751cbb653ada7867ed0800a189f8f05f830dd1a036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54755e8200853e55f03159f9af40c45d4
SHA19e57e71a5999c57b62cb76f91e52152c732a6614
SHA256d1cd80cfca3fefec795fd5f578fa1790947db6d6304cb9bcae8e6abe4c388042
SHA51260aaa645f4fc1652cc7baf4f264bb7f18aca48525c73b88dc438f72cfee168f583184e2da910aeea13b4770bb12bc3fa83df10a0efa2cc016e2656ce6170a637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de75994e6a8f03437180096f17bd740a
SHA178816174ffd6f0b2699ace18483c73c8b7710673
SHA2561317136a219cf9197ec5df3728469446952909db4fd76c670981d52b540025bc
SHA512a35c203c6e685acf45362815af9c789410b5370fa673ee2f928c7ddf96b7c1a081f2d30e89e0a4175753eb733f9b02c9ec5694be0a66a283a600ae71728a7c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0953b0db4c0a900a4f014a86bf2ff6
SHA132e589f2e3e77afd0902121a16c541174b8a463a
SHA256bdde68c252160ea4a0e9c3ebcaa1a344e9fc290cde090e14c519f9681bd5d7a7
SHA51221544c5da6d4a9659ee5d0ae318d7cdb9db12d3d855f4d5ea96ee09b7270ff215647af4ac5e353a020d5a4e9da629d5de9c0ac502a45bfe3ed1e2e46847ab4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca7c3a62a5e3e752b7a9d154cec44ec
SHA152c0fbb893abdaad4098888a1f071dc640dd496b
SHA25634d67b09d2a0304cea842bb1c41aed97c5a2f03e86199c12c77dab1a99cf4d98
SHA5128ea352c4bd2673cf8af87a4fc53bbd72d383b0ab3cd2c3c5fbed72eb6476651eaeab0eaa97352f8a6cda8f1143094c105ca7f4d90287f96ebd4b7c482e08808e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d8e660d4b7b4be17b5d5da0b6a9280
SHA1b0cd5be0dac575d4ef8e15f3886ad2b4d5cce2fe
SHA2564a5cda8686bbd8f306623092ca84af34680aae4d0a73eba6b77be5e0948e7596
SHA5124f63f269dd1b4c312ea13b2ad6f0896703865f5dd961b0f2af7e6edf714f836efeada35a01dee52d2d9e13b2b7ef11c1f351e2e099ba2eb3f679f2b647f907ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a95225ca7e5e7a8ba7674fe417088a6
SHA106a5d8e83b033cf969b3548c3fbe94e000fa6a5f
SHA2561121e1fe97b9b3433aa3c7b7af179c31f3732cd36582ec312c34db9d297440e3
SHA5121812005ca13ec6b915263904614226119a19ccd8282cc6dc2e62733091e2b5907af695606895ba7b6ac6917e665e1d1fa89d52d4bf43a5d5ca53ecd140c69cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177617bd62f5ab081fd17603e692c738
SHA1bf6616eb3c97df9876c9cae8716a1046abd4cb08
SHA256236e43367fcad7eb123359167bebef687c6d49034e2903affea6ff0103544142
SHA512cbc38d3d152d6c79546c97c78bb7059663f230fb5bbb918b11a9ae01b371f840a9a80dfdf4978c7032242d5eec8716f55fc7c72e3206aa563eeeac5302a39ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcefbf794b815546e2cae66696e0359a
SHA1f374c334d3968b2a99d1566de6eb2b56ff8b2775
SHA256cd313df814f75052b2d489a0ff3bfd4168f1f0a1f967ba40f6e21a4b7dca59e9
SHA51261f67faabb0230d74476d962c720f4009548caaca82aa8b6b11dbf29f43078d18735e9be202cb65186139eca91c3ee22c498186d702ce3d869f94788860bb918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca551e7df7dbb64568e2e7419bed5d1
SHA1ba8067654af762ee728c7911dfcbe0221814917b
SHA256a4371954046f14fcd23bfb17b6b57e17869432436334eeef794fce9963714d17
SHA512be195b65d2f9ac7fc239a2f633a5fdd40eb08b99456a4c5c4b10f1235473c7cc5297f81576fc8160ba96acb2a9dbf15cb689dc9fea8b547be57d4e33599b51a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd3baf6e9a7b51f31dc90c6315e0b0f
SHA10a782ef57980cf087cb1eb40e39c24125693ff2a
SHA25626f370904d1e0785dd8ca063406ce2200d0b44b8eb18947c27c2f120b228b429
SHA512abfbd3dc270521e2ff0a07b1758a5c93ad6ca252b980d37dde28ba564367340fc809bd1095c2c7f3f18037b3c636e4be6e346c68f1a9a4904af99958140fe379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc63af8bb1ec282959a62cb93f8d8db
SHA16dbbc899268057916c10594f813cccfed1905e7d
SHA256524931f40315f123ac263653a294c87231c2474934efdea1f78c9bc490923b43
SHA5127c78ac4dd87ef01d85c457a3347f0b214d348a69ac4ae1acc74c99e80faa030e460e59c1be041663d9aef4116da654843705d1dc42ebb43ecabd458fdaf3023f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4e8afc544b1bd7ecac07d5f3d5e7ec
SHA1a313332f92cb6142a94ad92abd382bb1f85ecb8e
SHA25665a52f47efa080c7b6cb60a9b89f7419fdb3c5fe1ca68869f3e68bed10d48a1a
SHA512315a7681c3c31015bb0895a36db8f97a6d729a6ac27db32197b622c41abbe8cbfa6279344d1e3f23e8d42ed4933680daeb9c08f62ba40325394403e6baa7c003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb717ff491529a12a03d3d26511246df
SHA1cd2e0e04e14abf9a501d2d01ab2b2592f41f3bd2
SHA256c6db49d2c96f175acd69e4bec6f193369b4f8cc89b7d79f0b1b9e13b5f6441f6
SHA512e6d3e18fb832de120255be8376235e84348bfd8efb4cd12ea2353608087c41c92307d515195c2c1c81b754f2f59fa9f70a6e8c495097f49369bfbe88508f63b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b